Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in DHCP Server Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows GDI can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows TCP/IP can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Streaming Service Proxy can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows Miracast Wireless Display can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Themes can be exploited remotely to execute arbitrary code.
- A heap buffer overflow vulnerability in WebP can be exploited to cause denial of service.
Первичный источник обнаружения
- CVE-2023-38162
CVE-2023-35355
CVE-2023-38141
CVE-2023-36802
CVE-2023-36804
CVE-2023-38160
CVE-2023-38143
CVE-2023-38144
CVE-2023-38150
CVE-2023-38152
CVE-2023-38142
CVE-2023-38149
CVE-2023-36803
CVE-2023-36805
CVE-2023-38140
CVE-2023-38147
CVE-2023-36801
CVE-2023-38148
CVE-2023-38146
CVE-2023-38161
CVE-2023-38139
CVE-2023-4863
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
Список CVE
- CVE-2023-4863 critical
- CVE-2023-38149 critical
- CVE-2023-38141 critical
- CVE-2023-36801 high
- CVE-2023-36804 critical
- CVE-2023-38160 high
- CVE-2023-38143 critical
- CVE-2023-38144 critical
- CVE-2023-38152 high
- CVE-2023-38161 critical
- CVE-2023-38142 critical
- CVE-2023-38139 critical
- CVE-2023-38162 critical
- CVE-2023-35355 critical
- CVE-2023-36802 critical
- CVE-2023-38150 critical
- CVE-2023-36803 high
- CVE-2023-36805 high
- CVE-2023-38140 high
- CVE-2023-38147 critical
- CVE-2023-38148 critical
- CVE-2023-38146 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!